Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [ 7.889412][ T22] audit: type=1400 audit(1585065194.978:10): avc: denied { watch } for pid=1774 comm="restorecond" path="/root/.ssh" dev="sda1" ino=16179 scontext=system_u:system_r:kernel_t:s0 tcontext=unconfined_u:object_r:ssh_home_t:s0 tclass=dir permissive=1 [ 7.893431][ T22] audit: type=1400 audit(1585065194.978:11): avc: denied { watch } for pid=1774 comm="restorecond" path="/etc/selinux/restorecond.conf" dev="sda1" ino=2280 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 12.737554][ T22] audit: type=1400 audit(1585065199.828:12): avc: denied { map } for pid=1852 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.23' (ECDSA) to the list of known hosts. 2020/03/24 15:53:26 fuzzer started [ 18.922073][ T22] audit: type=1400 audit(1585065206.008:13): avc: denied { map } for pid=1867 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2020/03/24 15:53:26 dialing manager at 10.128.0.105:46321 2020/03/24 15:53:30 syscalls: 1763 2020/03/24 15:53:30 code coverage: enabled 2020/03/24 15:53:30 comparison tracing: enabled 2020/03/24 15:53:30 extra coverage: enabled 2020/03/24 15:53:30 setuid sandbox: enabled 2020/03/24 15:53:30 namespace sandbox: enabled 2020/03/24 15:53:30 Android sandbox: /sys/fs/selinux/policy does not exist 2020/03/24 15:53:30 fault injection: enabled 2020/03/24 15:53:30 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/03/24 15:53:30 net packet injection: enabled 2020/03/24 15:53:30 net device setup: enabled 2020/03/24 15:53:30 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/03/24 15:53:30 devlink PCI setup: PCI device 0000:00:10.0 is not available 15:54:41 executing program 5: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000080)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000000180)=0xe8) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x64, r0, 0x1, 0x70bd26, 0x25dfdbfb, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x1}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x7f}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x80000000}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x7}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0x1}, 0x4000005) getsockname$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x4000, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) ioctl$EVIOCSREP(r2, 0x40084503, &(0x7f0000000380)=[0x1, 0x401]) r3 = fcntl$dupfd(r2, 0x0, r2) lsetxattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)=@random={'trusted.', 'batadv\x00'}, &(0x7f0000000440)='mime_type\\$vmnet0[cgroupcpuset\x00', 0x1f, 0x3) ioctl$KDSETMODE(r2, 0x4b3a, 0x1) r4 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000480)='/dev/urandom\x00', 0x0, 0x0) write$binfmt_misc(r4, &(0x7f00000004c0)={'syz0', "06dae88a5806c845867218616f725a5912241a5ea02965d2fb93ead8546c5fb222d62da1b8edcb97e7ac08a83613c637dbb4efd52308921155bdae71fccc61856a15a9eee16b8a06614aff072a890ee384ff13f392e3e66c507cd01238e0135bdb227be9038225220d12251b6bb58a2511ad6b0694f84a43a9ca710acba45587f1bd7d14344cc0c93d705bf7378f0959b2b9a18628e673c2b0c8c7169375c2fa6dfecefc9ef0a8813c0c84bb5a74bec0da7110e83503edc1e7bbbac633df"}, 0xc2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f00000005c0)={0x0, 0x0, 0x1, 0x0, [], [{0x401, 0xfffffffd, 0x7ff, 0x7fffffff, 0x80, 0x5}, {0x2, 0x0, 0x5, 0x2, 0x5, 0x1}], [[]]}) getxattr(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)=@random={'btrfs.', '\x00'}, &(0x7f0000000740)=""/203, 0xcb) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, 0x4, 0x6, 0x101, 0x0, 0x0, {0x1, 0x0, 0x3}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x4000000) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000940)={0x0, 0x87, 0x3, 0x6, 0x1, [{0xc6d, 0x4, 0x6, [], 0x200}]}) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x420200, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x5, 0x810, r5, 0x0) statx(r3, &(0x7f0000000a00)='./file0\x00', 0x2000, 0x200, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r6, 0xee01, 0x0) 15:54:41 executing program 2: setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='system.posix_acl_access\x00', &(0x7f0000000080)='#%cgroupcpuset\'\x00', 0x10, 0x1) r0 = add_key(&(0x7f0000000140)='trusted\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, r0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x4082, 0x0) mknodat(r1, &(0x7f0000000200)='./file0\x00', 0x200, 0x9) pipe(&(0x7f0000001dc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000001e00)={0x3, 0x1, 0x81, 0x3, 0x6781}, 0xc) r4 = accept(r1, &(0x7f0000001e40)=@x25, &(0x7f0000001ec0)=0x80) sendmsg$IPSET_CMD_FLUSH(r4, &(0x7f0000001fc0)={&(0x7f0000001f00)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001f80)={&(0x7f0000001f40)={0x24, 0x4, 0x6, 0x201, 0x0, 0x0, {0xe3c956ba3609e5f5}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x4000800) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000002000)=0xbbda62f58df5c548, 0x4) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000002040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$P9_RSTATFS(r5, &(0x7f0000002080)={0x43, 0x9, 0x1, {0xfffffff8, 0x6, 0x7fffffff, 0x7, 0x80000000, 0x6, 0x0, 0x7fff, 0x9}}, 0x43) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000002100)='/dev/null\x00', 0x102, 0x0) sendmsg$NFNL_MSG_ACCT_GET(r6, &(0x7f0000002240)={&(0x7f0000002140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000002200)={&(0x7f0000002180)={0x80, 0x1, 0x7, 0x101, 0x0, 0x0, {0x3, 0x0, 0x2}, [@NFACCT_BYTES={0xc}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0xffffffffffffffab}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x100000001}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x9}, @NFACCT_FILTER={0x3c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x80}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x1f}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x4}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x10b}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x80}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x9}, @NFACCT_FILTER_VALUE={0x8}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x40}, 0x40000) r7 = accept$inet6(r4, &(0x7f0000002280)={0xa, 0x0, 0x0, @dev}, &(0x7f00000022c0)=0x1c) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000002300)={'vxcan0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r7, 0x890c, &(0x7f0000002340)={@mcast2, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x31}}, @remote, 0xffffffff, 0x5, 0x7, 0x0, 0x7, 0x0, r8}) r9 = open(&(0x7f0000002480)='./file0\x00', 0x498100, 0x2) setsockopt$inet6_tcp_TCP_MD5SIG(r9, 0x6, 0xe, &(0x7f00000024c0)={@in6={{0xa, 0x4e23, 0x9, @empty, 0x7}}, 0x0, 0x0, 0x26, 0x0, "1e2339bd3784e76ed894d41ef1500c977d3710982fb2325d68c57588b08f45877ce582fbef6f63ba35f4bc420aa05a010f35373aa60b64e45dc53144874ec3e6f0258fcdbdb29241badbfd5965a2ce26"}, 0xd8) sendmsg$NLBL_UNLABEL_C_STATICLIST(0xffffffffffffffff, &(0x7f00000026c0)={&(0x7f00000025c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000002680)={&(0x7f0000002640)={0x30, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast1}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, 0x30}}, 0x20044000) 15:54:41 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x82000, 0x0) r1 = accept4$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000080)=0x14, 0x80000) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f00000000c0)=@req3={0x400, 0x20000000, 0xbc7, 0x35c2, 0xd569, 0x5, 0x7}, 0x1c) socketpair(0x6, 0x2, 0x9, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2200000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r4, 0x200, 0x70bd2d, 0xfffffff9, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e21}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e24}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e24}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004084}, 0x4000000) write$P9_RUNLINKAT(r0, &(0x7f0000000280)={0x7, 0x4d, 0x1}, 0x7) sendfile(r1, r3, &(0x7f00000002c0)=0xbd, 0x1) r5 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x4002, 0xa) ioctl$KDDELIO(r5, 0x4b35, 0x932e) keyctl$setperm(0x5, 0x0, 0x1) r6 = io_uring_setup(0xbfe, &(0x7f0000000340)={0x0, 0x0, 0x7, 0x1, 0x1c9}) close(r6) removexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)=@random={'os2.', 'fou\x00'}) pipe2(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r7, &(0x7f0000000880)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000840)={&(0x7f0000000500)={0x318, r8, 0x10, 0x70bd2b, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x54, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x104}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xef9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1}]}, @TIPC_NLA_NET={0x38, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xa2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x100000001}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7fff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x101}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xa9}]}, @TIPC_NLA_LINK={0xf8, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffff8}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1fd}]}]}, @TIPC_NLA_SOCK={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x240}, @TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x9}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7fff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_REF={0x8}]}, @TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x800}]}, @TIPC_NLA_MEDIA={0x5c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x63b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffe00}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}]}]}, @TIPC_NLA_BEARER={0x4c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5763}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}]}, @TIPC_NLA_MEDIA={0x6c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x25}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb135}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x28000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffff4b6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x80000000}]}]}, 0x318}, 0x1, 0x0, 0x0, 0x4000810}, 0x20000004) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f00000008c0)={0x7, 0x79, 0x2}, 0x7) r9 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/policy\x00', 0x0, 0x0) write$P9_RREMOVE(r9, &(0x7f0000000940)={0x7, 0x7b, 0x2}, 0x7) 15:54:41 executing program 1: ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wg1\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r0, 0x1, 0x6}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.controllers\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f00000000c0)=""/28) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000100)=0x80000000) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000140)) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/tcp\x00') ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f0000000280)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'wg1\x00'}]}, 0x10) pivot_root(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file0\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000004a00)=[{{&(0x7f0000000380)=@ethernet={0x0, @local}, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000400)=""/52, 0x34}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/4096, 0x1000}, {&(0x7f0000002440)=""/65, 0x41}], 0x4, &(0x7f0000002500)=""/137, 0x89}}, {{&(0x7f00000025c0)=@l2, 0x80, &(0x7f0000002bc0)=[{&(0x7f0000002640)=""/31, 0x1f}, {&(0x7f0000002680)=""/249, 0xf9}, {&(0x7f0000002780)=""/166, 0xa6}, {&(0x7f0000002840)=""/80, 0x50}, {&(0x7f00000028c0)=""/183, 0xb7}, {&(0x7f0000002980)=""/181, 0xb5}, {&(0x7f0000002a40)=""/116, 0x74}, {&(0x7f0000002ac0)=""/226, 0xe2}], 0x8, &(0x7f0000002c40)=""/222, 0xde}, 0x3000}, {{&(0x7f0000002d40)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000004300)=[{&(0x7f0000002dc0)=""/212, 0xd4}, {&(0x7f0000002ec0)=""/51, 0x33}, {&(0x7f0000002f00)=""/250, 0xfa}, {&(0x7f0000003000)=""/3, 0x3}, {&(0x7f0000003040)=""/221, 0xdd}, {&(0x7f0000003140)=""/102, 0x66}, {&(0x7f00000031c0)=""/122, 0x7a}, {&(0x7f0000003240)=""/4096, 0x1000}, {&(0x7f0000004240)=""/128, 0x80}, {&(0x7f00000042c0)=""/9, 0x9}], 0xa, &(0x7f00000043c0)=""/63, 0x3f}, 0x7ff}, {{&(0x7f0000004400)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000004700)=[{&(0x7f0000004480)=""/42, 0x2a}, {&(0x7f00000044c0)=""/2, 0x2}, {&(0x7f0000004500)=""/212, 0xd4}, {&(0x7f0000004600)=""/97, 0x61}, {&(0x7f0000004680)=""/108, 0x6c}], 0x5, &(0x7f0000004780)=""/181, 0xb5}, 0xfffffff7}, {{&(0x7f0000004840)=@isdn, 0x80, &(0x7f00000049c0)=[{&(0x7f00000048c0)=""/225, 0xe1}], 0x1}, 0x5}], 0x5, 0x2100, &(0x7f0000004b40)={0x0, 0x1c9c380}) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000004bc0)='ethtool\x00') ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000004c40)={'wg2\x00', 0x0}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000004cc0)=@req={0x28, &(0x7f0000004c80)={'vlan0\x00', @ifru_addrs=@xdp={0x2c, 0xd, 0x0, 0x3e}}}) accept$packet(r1, &(0x7f0000006540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006580)=0x14) sendmsg$ETHTOOL_MSG_STRSET_GET(r3, &(0x7f0000006800)={&(0x7f0000004b80)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000067c0)={&(0x7f00000065c0)={0x1d8, r4, 0x1, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_STRSET_HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}]}, @ETHTOOL_A_STRSET_HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}]}, @ETHTOOL_A_STRSET_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_STRSET_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0x1d8}, 0x1, 0x0, 0x0, 0x40004}, 0x4040035) execve(&(0x7f0000006840)='./file0\x00', &(0x7f0000006940)=[&(0x7f0000006880)='ipvlan0\x00', &(0x7f00000068c0)='#keyring+&nodev]procvboxnet0^md5sum\x00', &(0x7f0000006900)='macsec0\x00'], &(0x7f0000006bc0)=[&(0x7f0000006980)='ipvlan0\x00', &(0x7f00000069c0)='gre0\x00', &(0x7f0000006a00)='ip6gretap0\x00', &(0x7f0000006a40)='veth1_macvtap\x00', &(0x7f0000006a80)='ipvlan0\x00', &(0x7f0000006ac0)='virt_wifi0\x00', &(0x7f0000006b00)='macvlan1\x00', &(0x7f0000006b40)='{{self\x00', &(0x7f0000006b80)='ip6gretap0\x00']) r8 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000006c40)='/selinux/enforce\x00', 0x32400, 0x0) ioctl$ASHMEM_SET_SIZE(r8, 0x40087703, 0x2) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000006cc0)={0x6, &(0x7f0000006c80)=[{0xfffe, 0xfc, 0x67, 0x9}, {0x0, 0x8, 0x9, 0x6}, {0x7, 0x3, 0x9, 0x5}, {0x400, 0x3f, 0x7, 0x1}, {0x8, 0x3, 0x4, 0x9}, {0x9, 0xc3, 0x1, 0x4}]}) 15:54:41 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x0, 0x2, 0x201, 0x0, 0x0, {0x7, 0x0, 0x2}, [@CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x2004c8c5}, 0x8000) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000100)='syz1\x00'}, 0x30) process_vm_readv(r1, &(0x7f0000000440)=[{&(0x7f0000000180)=""/252, 0xfc}, {&(0x7f0000000280)=""/207, 0xcf}, {&(0x7f0000000380)=""/146, 0x92}], 0x3, &(0x7f00000005c0)=[{&(0x7f0000000480)=""/69, 0x45}, {&(0x7f0000000500)=""/19, 0x13}, {&(0x7f0000000540)=""/88, 0x58}], 0x3, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000600)={0x0, r0, 0x4}, 0x10) r2 = socket$key(0xf, 0x3, 0x2) fsetxattr$security_evm(r2, &(0x7f0000000640)='security.evm\x00', &(0x7f0000000680)=@v1={0x2, "07f4bc9f668e2a949d0629e5e0"}, 0xe, 0x2) r3 = accept4(r0, &(0x7f0000000780)=@ipx, &(0x7f0000000800)=0x80, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f0000000940)={&(0x7f0000000840), 0xc, &(0x7f0000000900)={&(0x7f0000000880)={0x48, 0x0, 0x7, 0x401, 0x0, 0x0, {0xc, 0x0, 0x6}, [@NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x1}, @NFACCT_FILTER={0x1c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x800}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0xfffffffb}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x482f}]}, @NFACCT_PKTS={0xc}]}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x891) inotify_init1(0x800) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980)='/dev/hwrng\x00', 0x8000, 0x0) openat$cgroup_ro(r4, &(0x7f00000009c0)='rdma.current\x00', 0x0, 0x0) connect$vsock_dgram(0xffffffffffffffff, &(0x7f0000000a00)={0x28, 0x0, 0xffffffff, @host}, 0x10) r5 = request_key(&(0x7f0000000a40)='user\x00', &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000ac0)='/dev/hwrng\x00', 0xfffffffffffffff8) r6 = request_key(&(0x7f0000000b00)='trusted\x00', &(0x7f0000000b40)={'syz', 0x3}, &(0x7f0000000b80)='syz1\x00', 0xfffffffffffffff9) keyctl$link(0x8, r5, r6) r7 = creat(&(0x7f0000000bc0)='./file0\x00', 0x184) sendmsg$key(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000c40)={&(0x7f0000000c00)={0x2, 0x18, 0x2, 0x0, 0x7, 0x0, 0x70bd29, 0x25dfdbff, [@sadb_x_filter={0x5, 0x1a, @in6=@rand_addr="37f2b2e7e7066116388c5cb0263c5c67", @in=@rand_addr=0xd522, 0x2b, 0x14, 0x14}]}, 0x38}}, 0x40) r8 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000cc0)='/selinux/mls\x00', 0x0, 0x0) write$P9_RLERRORu(r8, &(0x7f0000000d00)={0x16, 0x7, 0x2, {{0x9, 'mime_type'}}}, 0x16) 15:54:41 executing program 4: utime(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x8, 0xc7b}) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) utimensat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{0x77359400}, {r1, r2/1000+30000}}, 0x0) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/checkreqprot\x00', 0x10700, 0x0) ioctl$EVIOCGVERSION(r3, 0x80044501, &(0x7f00000001c0)=""/101) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000240)={'HL\x00'}, &(0x7f0000000280)=0x1e) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000002c0)={0x0, 0x0, 0x3, 0x0, [], [{0x1, 0x5a08326f, 0x10001, 0x9a, 0x6, 0xffffffff8d298ff7}, {0x1, 0x7, 0x0, 0x7fff, 0x20000000, 0x9}], [[], [], []]}) r4 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r4, 0x8983, &(0x7f0000000440)) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/tty/ldiscs\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000004c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r5, 0x80082102, &(0x7f0000000540)=r6) r7 = socket$pptp(0x18, 0x1, 0x2) sendto(r7, &(0x7f0000000b80)="7685b014b31d17c028553db7ac4877e986d3962d592427e8af181e7fa44c456aa646c8d0113d6d9a18f953deeb8a7cf31dab1ee79c97f8f0a360f619decc723e2859d0450944521c9fa44fa8bed1705571f34872cf0a554bb8d878821537397f3243a916a6dbadbd1093f298e22c0b2806122a4bedfe0251140d87527a23b73d7364121a1af39146915b8aa84606a1860ff0ecd1fcaea60de327db67925d80ff68520f41214d794e68ea971f4d661de8caf882f03f100b0fc7e24ce70b303ca3aab1159f62c5dc301201f29473c5b800e1b7b239be37da18ca62d1d539f3fc329e303fdadbf93c606e9d9913c6de816f3f2bdf86a34e3f6e", 0xf8, 0x4008000, &(0x7f0000000c80)=@vsock={0x28, 0x0, 0x2711}, 0x80) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000d00)=0xffff) r8 = dup(0xffffffffffffffff) ioctl$IOC_PR_RESERVE(r8, 0x401070c9, &(0x7f0000000d40)={0x4, 0xffffffff, 0x1}) ioctl$BLKZEROOUT(r5, 0x127f, &(0x7f0000000d80)={0xffffffffffff8180, 0x7f}) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000dc0)={0x20, 0x0, 0x8, {0x7, 0x0, 0x7, 0x6}}, 0x20) [ 94.027668][ T22] audit: type=1400 audit(1585065281.118:14): avc: denied { map } for pid=1867 comm="syz-fuzzer" path="/root/syzkaller-shm656786647" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 94.064127][ T22] audit: type=1400 audit(1585065281.148:15): avc: denied { map } for pid=1928 comm="syz-executor.3" path="/sys/kernel/debug/kcov" dev="debugfs" ino=7887 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 94.239353][ T1932] cgroup1: Unknown subsys name 'perf_event' [ 94.245747][ T1932] cgroup1: Unknown subsys name 'net_cls' [ 94.264543][ T1933] cgroup1: Unknown subsys name 'perf_event' [ 94.267336][ T1934] cgroup1: Unknown subsys name 'perf_event' [ 94.271029][ T1936] cgroup1: Unknown subsys name 'perf_event' [ 94.276599][ T1934] cgroup1: Unknown subsys name 'net_cls' [ 94.282501][ T1933] cgroup1: Unknown subsys name 'net_cls' [ 94.288612][ T1935] cgroup1: Unknown subsys name 'perf_event' [ 94.296627][ T1936] cgroup1: Unknown subsys name 'net_cls' [ 94.303032][ T1935] cgroup1: Unknown subsys name 'net_cls' [ 94.307901][ T1938] cgroup1: Unknown subsys name 'perf_event' [ 94.318549][ T1938] cgroup1: Unknown subsys name 'net_cls' [ 95.310277][ T22] audit: type=1400 audit(1585065282.398:16): avc: denied { create } for pid=1933 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 95.363874][ T22] audit: type=1400 audit(1585065282.398:17): avc: denied { write } for pid=1933 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 95.392156][ T22] audit: type=1400 audit(1585065282.398:18): avc: denied { read } for pid=1933 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 98.171844][ T22] audit: type=1400 audit(1585065285.258:19): avc: denied { associate } for pid=1933 comm="syz-executor.1" name="syz1" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 15:54:45 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x100002, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz0\x00'}, 0x45c) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x10001, 0x6b}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x4) ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0x1) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0xffffffffffffffda, 0x7, {0x7}}, 0x18) ioctl$TIOCGPKT(r2, 0x80045438, &(0x7f0000000000)) [ 98.283949][ T4407] input: syz0 as /devices/virtual/input/input4 [ 98.329433][ T4407] input: syz0 as /devices/virtual/input/input5 15:54:45 executing program 1: socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x9, 0x2}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0xc9, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x2}, 0x0, 0xffffffffffffffff, 0xfffffffe, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}}, 0x0, 0xffffffffffffffff, r4, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r7 = socket(0x10, 0x2, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x60008, &(0x7f0000000780)=ANY=[@ANYPTR=&(0x7f0000000200)=ANY=[@ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB="eec4d68acc5657860751df3d3834aa485d0f27872351ae3232adb65caa9bdffbb7225ad28559ee242df4a2"], @ANYRES64=r1, @ANYPTR64=&(0x7f0000000180)=ANY=[@ANYRESOCT=r8, @ANYRESHEX=r3], @ANYRES32, @ANYRESDEC], @ANYRESHEX=r6, @ANYRESOCT, @ANYRESDEC=0x0, @ANYRES32=r7, @ANYRESDEC=0x0, @ANYBLOB='\x00\x00', @ANYPTR64=&(0x7f0000000480)=ANY=[@ANYRESHEX, @ANYRESDEC, @ANYRESHEX, @ANYPTR=&(0x7f0000000040)=ANY=[@ANYRESOCT], @ANYRES16, @ANYBLOB="0aabfd2a4adaa88315eb0f07cfbebcb49759f3e7f89b40b39669fcd3efb00c486aa4c9d5610cb933f0a45eb63e1db006dc3d4a989e476744f8c723bf2013db3381e5de622025692904000000ed5ac4035bd0f654aa209c91ed3bbd36ef9d2d4606e674c0cfff0184807bc1734afb21517cd93ecc1b69183e79b659c129e48a572dc1a437000000003dd80f94f0e51c46f5bab6628133af8fde938d5ce7a878e67b00d65584572f078580f9e393105405f80165745a27aee60ba272cc8c2553f81c0085574656b69102f13593", @ANYRESDEC=r5, @ANYPTR64=&(0x7f0000000340)=ANY=[@ANYPTR64, @ANYRESDEC=r1, @ANYPTR, @ANYRES64, @ANYPTR, @ANYBLOB="51c966e78973275e5daf0501c73b1ddacbbb0d8e23b6c877ad13333db71055feaa6856b26d11807c470b2c93da3504bceb4907de279e775c1313c052a98f7562464ed9cda0208798ab4b6ce9a9bb797a69b486f7182271f209709b342167521833a7180ec7bb2d6eafb9f6325b9bdc3d3758ffa6a2781b58929834b5d118e33adcc2e59a462dd50e71f6100b5e9b71e34df718404b7fdf4c5d8a7681848b5e91d0365f78e6f6e88caee2200859879d39c189126a6cbd4862e8d795888f82820ca47540d12cb615c032bfe268e659c5b2948ecd9a60e86cc67e90bca0a93e4c", @ANYRES16]], @ANYBLOB="ed003bd0729c485a4ebb788814b899ab6fa0922473fe3e5f4afb5cf00dcb995a12b35646ce0dc9fc", @ANYRESOCT, @ANYRES16=0x0, @ANYRESDEC]) 15:54:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000300), 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x5c, r2, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7f}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @dev={0xfe, 0x80, [], 0x34}}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x7}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000080}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x203, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$UI_SET_SWBIT(r5, 0x4004556d, 0xa) r6 = socket(0x100000000011, 0x2, 0x0) bind(r6, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b76795008000000000007f000000000000009e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r6, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e000709000000000000000001000000", @ANYRES32=r7], 0x2}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=@newlink={0x68, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x40, 0x12, 0x0, 0x1, @erspan={{0xb, 0x1, 'erspan\x00'}, {0x30, 0x2, 0x0, 0x1, [@IFLA_GRE_OKEY={0x8, 0x5, 0x7}, @IFLA_GRE_ERSPAN_DIR={0x5, 0x17, 0x1}, @IFLA_GRE_ERSPAN_INDEX={0x8, 0x15, 0x16b72}, @IFLA_GRE_TTL={0x5, 0x8, 0x6}, @IFLA_GRE_LINK={0x8, 0x1, r7}, @IFLA_GRE_COLLECT_METADATA={0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x68}}, 0x0) 15:54:45 executing program 3: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000640)=[{&(0x7f0000000180)=""/94, 0x5e}, {&(0x7f0000000240)=""/123, 0x7b}, {0x0}, {&(0x7f0000000400)=""/162, 0xa2}], 0x4, 0x0) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, &(0x7f0000000240)={0xffff, 0x5}) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NLBL_MGMT_C_REMOVEDEF(0xffffffffffffffff, 0x0, 0x0) creat(0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000080)=0x5, 0x4) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x11) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) [ 98.491262][ T22] audit: type=1400 audit(1585065285.578:20): avc: denied { open } for pid=4481 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 15:54:45 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") flistxattr(r0, &(0x7f0000000080)=""/45, 0x2d) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000480)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) 15:54:45 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x3, 0x0, 0x0, 0x5, 0x0, 0x0, 0x8000000000}, 0x0) waitid(0x1, 0x0, 0x0, 0x0, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x10001, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x10001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x7, 0xb8b6, 0x10001, 0x258fe580, 0x7, 0x8001, 0x79b3c799, 0x8}, &(0x7f0000000100)={0xfffffffffffffffd, 0x3, 0x20, 0x200, 0x4, 0x6, 0x3, 0x5}, &(0x7f0000000140)={0x1, 0x9, 0x4, 0x7, 0x4, 0x0, 0x7, 0x1}, &(0x7f0000000200)={r3, r4+10000000}, &(0x7f00000002c0)={&(0x7f0000000240)={[0x9]}, 0x8}) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r6 = ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$P9_RFSYNC(0xffffffffffffffff, &(0x7f00000001c0)={0x7}, 0x7) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) 15:54:45 executing program 5: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ftruncate(r0, 0x2081ff) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) io_setup(0x4, &(0x7f0000000040)=0x0) io_submit(r3, 0x2, &(0x7f0000000080)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f00000000c0)="aa", 0x1}, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x0, 0xffffffffffffffff}]) [ 98.518524][ T22] audit: type=1400 audit(1585065285.578:21): avc: denied { kernel } for pid=4481 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 98.528112][ C0] hrtimer: interrupt took 22303 ns 15:54:45 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") flistxattr(r0, &(0x7f0000000080)=""/45, 0x2d) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000480)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) 15:54:45 executing program 0: r0 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000080)={0x7fe}, 0x10) write(r0, &(0x7f0000000280)="1c0000001a009b8a14e5f4070009042400000000ff03000000000000", 0x1e5) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") fcntl$setpipe(r1, 0x407, 0xa15) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='veth0_to_hsr\x00'}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b405000000000000711028000000000046000000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000080), 0xfffffffffffffffb}, 0x48) 15:54:45 executing program 3: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000640)=[{&(0x7f0000000180)=""/94, 0x5e}, {&(0x7f0000000240)=""/123, 0x7b}, {0x0}, {&(0x7f0000000400)=""/162, 0xa2}], 0x4, 0x0) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, &(0x7f0000000240)={0xffff, 0x5}) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NLBL_MGMT_C_REMOVEDEF(0xffffffffffffffff, 0x0, 0x0) creat(0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000080)=0x5, 0x4) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x11) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) [ 98.752567][ T22] audit: type=1400 audit(1585065285.838:22): avc: denied { prog_load } for pid=4513 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 15:54:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r0) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="020181ffffff10000000ff45ac000000000063000800000000000000004000ffffffa6000000e1000000887700720030070005000fffff000000008700da55aa", 0x40, 0x1c0}]) lseek(r1, 0x4, 0x1) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x18, 0x3f9, 0x200, 0x70bd25, 0x25dfdbfc, {0x1}, [""]}, 0x18}}, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 15:54:45 executing program 0: r0 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000080)={0x7fe}, 0x10) write(r0, &(0x7f0000000280)="1c0000001a009b8a14e5f4070009042400000000ff03000000000000", 0x1e5) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") fcntl$setpipe(r1, 0x407, 0xa15) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='veth0_to_hsr\x00'}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b405000000000000711028000000000046000000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000080), 0xfffffffffffffffb}, 0x48) [ 98.790401][ T22] audit: type=1400 audit(1585065285.868:23): avc: denied { prog_run } for pid=4513 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 15:54:45 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x4a, 0x0, 0xffffffffffffff9c}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x4a, 0x0, 0xffffffffffffff9c}, 0x2c) dup2(r0, r1) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) ioctl$KDFONTOP_GET(r2, 0x4b72, &(0x7f0000000480)={0x1, 0x0, 0x3, 0x10, 0x1d5, &(0x7f0000000080)}) 15:54:45 executing program 5: prctl$PR_CAPBSET_READ(0x17, 0x24) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300090e000000000000000000001005000600000001000000000000000000000025216c754a40517affffac1e00bb32000000000000000200016ad9fecb00000002020000000005000500000000000a00000000000000fe8000000000000000000000000000aa0000000000000000dd3208a23fde82b213ab2a49000c1158e1a4d7ddcfbf3351011aa6b8114b82ef642225b7ae3641d430651a3cb3707f8d2e50c0671b9589e8a98516eb8b18eabe8c3f5e892fb2eac9d0f3abcbda2f3f379dd428152646cf1b8848b97aff406b8c96e4464a8f85919db597c91e45776d3d8f3ef5610747db3313b3b73f0f00301202a29f1399eae9e0d74acb44719c4ea0864bc13a0a7e91c407f45e081db5d7d7ea32788289e98cf8508b11a6aed07c958c7c30213151695278a807b3556c79cf711407c2ef30aa20b1fb1dca3646a869d6316d1fe497b1316264428d29281a6a3220d580cd84932ea87b20ebfcad3c8dc2f977f206bca791c8908f7f60f18993adc6ade8ea252a4da718ee0e2aa66d5054336489ef5e2db9d0b93ca3f00ce1324635aacbf98f2f0eb39e333aa47e1c30baf3ef4f240711d494210c7db96bbe2aba6728770f0f769491fd8379ae584c227cc1eadbebf1ea820cbf59b32608b4be835449913690f489ec9a4b4084957b5db75e49c37ed26ec923e170bf97f4fa5087f3ffdb65842a491bcb3fccf6b43f2fa291ac432212cdb5d441cf"], 0x70}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f0000000000)={'ip6tnl0\x00', 0xffff}) 15:54:46 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) preadv(r1, &(0x7f0000001640)=[{&(0x7f0000000040)=""/45, 0x2d}, {&(0x7f00000000c0)=""/251, 0xfb}, {&(0x7f0000000340)=""/253, 0xfd}, {&(0x7f0000000200)=""/119, 0x77}, {&(0x7f0000000440)=""/75, 0x4b}, {&(0x7f00000004c0)=""/92, 0x5c}, {&(0x7f0000001740)=""/226, 0xe2}, {&(0x7f0000000640)=""/4096, 0x1000}], 0x8, 0x4) socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001700)=ANY=[@ANYBLOB="54000000300003"], 0x1}}, 0x51) sendfile(r2, r1, 0x0, 0x100000001) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") bpf$OBJ_GET_PROG(0x7, &(0x7f00000016c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 15:54:46 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) removexattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=@known='security.apparmor\x00') umount2(&(0x7f0000000200)='./file0\x00', 0xb) [ 98.947823][ T4531] loop4: p1 p2 p3 p4 < > [ 98.957747][ T4531] loop4: partition table partially beyond EOD, truncated [ 98.983550][ T4531] loop4: p1 start 16 is beyond EOD, truncated [ 98.994363][ T4531] loop4: p2 size 1073741824 extends beyond EOD, truncated 15:54:46 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) write$rfkill(r0, &(0x7f0000000040), 0x8) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000140)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6c6f7765726469723d2e2f6275732c776f726b64698c3d2e2f66696c65312c75707065726469723d2e2f66696c6530"]) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b76795008000000000007f000000000000009e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r1, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r2], 0x2}}, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000200)={@rand_addr=0x70, @rand_addr=0x8, r2}, 0xc) chdir(&(0x7f00000002c0)='./bus\x00') r3 = open(&(0x7f0000001640)='./file0\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='security.evm\x00', 0x0, 0x0, 0x0) lseek(r3, 0x0, 0x4) 15:54:46 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) removexattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=@known='security.apparmor\x00') umount2(&(0x7f0000000200)='./file0\x00', 0xb) 15:54:46 executing program 3: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000640)=[{&(0x7f0000000180)=""/94, 0x5e}, {&(0x7f0000000240)=""/123, 0x7b}, {0x0}, {&(0x7f0000000400)=""/162, 0xa2}], 0x4, 0x0) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, &(0x7f0000000240)={0xffff, 0x5}) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NLBL_MGMT_C_REMOVEDEF(0xffffffffffffffff, 0x0, 0x0) creat(0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000080)=0x5, 0x4) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x11) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) [ 99.051723][ T4531] loop4: p3 start 225 is beyond EOD, truncated [ 99.064282][ T4531] loop4: p4 start 255 is beyond EOD, truncated [ 99.114859][ T4550] overlayfs: unrecognized mount option "workdiŒ=./file1" or missing value [ 99.124054][ T4543] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4543 comm=syz-executor.0 [ 99.146790][ T4543] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4543 comm=syz-executor.0 [ 99.183656][ T4543] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4543 comm=syz-executor.0 [ 99.212335][ T4543] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4543 comm=syz-executor.0 [ 99.229182][ T4540] loop4: p1 p2 p3 p4 < > [ 99.234304][ T4540] loop4: partition table partially beyond EOD, truncated [ 99.250258][ T4543] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4543 comm=syz-executor.0 [ 99.263947][ T4550] overlayfs: unrecognized mount option "workdiŒ=./file1" or missing value 15:54:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xd, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getpid() clone(0x800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x678eb980, 0x0, 0x0, 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x3) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r1, 0x8983, &(0x7f0000000000)={0x8, '\x00', {'macvlan0\x00'}}) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) socket$netlink(0x10, 0x3, 0x9) [ 99.264545][ T4543] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4543 comm=syz-executor.0 [ 99.293560][ T4540] loop4: p1 start 16 is beyond EOD, truncated [ 99.307705][ T4540] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 99.325817][ T4540] loop4: p3 start 225 is beyond EOD, truncated [ 99.332542][ T4543] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4543 comm=syz-executor.0 [ 99.345292][ T4540] loop4: p4 start 255 is beyond EOD, truncated [ 99.357385][ T4543] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4543 comm=syz-executor.0 15:54:46 executing program 3: clone(0x8c00, 0x0, &(0x7f0000000040), 0x0, 0x0) 15:54:46 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKRESETZONE(r4, 0x40101283, &(0x7f00000000c0)={0xa4b, 0x5}) close(r2) socket$inet(0x10, 0x2, 0x3f) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)="4c0100001200ff09", 0x8}], 0x1}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f0000000040)=0x4) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000080)={0x7fe}, 0x10) write(0xffffffffffffffff, &(0x7f0000000280)="1c0000001a009b8a14e5f4070009042400000000ff03000000000000", 0x1e5) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) r7 = socket$netlink(0x10, 0x3, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") splice(r0, 0x0, r6, 0x0, 0x4ffe0, 0x0) [ 99.374989][ T4543] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4543 comm=syz-executor.0 [ 99.388100][ T4543] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4543 comm=syz-executor.0 15:54:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @rand_addr, 0x0, 0x0, 'none\x00', 0x0, 0x4}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2824c27, 0x0) chroot(&(0x7f0000000100)='./file0/file0\x00') ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000140)) [ 99.529308][ T4582] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 99.574141][ T493] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 15:54:46 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) r2 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x2) fchdir(r2) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000680)=ANY=[@ANYBLOB="e4"], 0x1) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r5) sendfile(r3, r3, &(0x7f0000000240), 0x7fff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:54:46 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800006, 0x11, r0, 0x403000) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r2, 0x2008001) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) sendfile(r3, r4, 0x0, 0x200fff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r6 = dup(r5) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r6, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4}, 0x0, 0x0, &(0x7f00000001c0)={0x1, 0x8, 0xffff, 0x2}, &(0x7f0000000200)=0x10001, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x5}}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 15:54:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000180)='./file0/file0\x00', 0x1070c5, 0x92) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) faccessat(r1, &(0x7f00000000c0)='./file0/file0\x00', 0x8, 0xa00) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000500)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f800000300000030030000980200000000000000000000000000000000000098020000980200009802000098020000980200000300800000000000e8ffffffffffffffe00000010000000000000000e4000000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f736530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c8503007e0b384e43911000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc880616024662a48840d5b900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffffffffffff00000000000000000000000003000000070000000000000000000000000000004800435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000400000000000000000000000000000070009000000000000000000000000000000000000000000020004e4f545241434b00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028000000000000"], 0x1) getsockopt$inet6_tcp_buf(r1, 0x6, 0xe, &(0x7f0000001a00)=""/4096, &(0x7f0000000000)=0x1000) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$USBDEVFS_BULK(0xffffffffffffffff, 0xc0185502, 0x0) syz_open_procfs(0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/wireless\x00') write$9p(r0, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f", 0x300) 15:54:47 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000080)={0x7fe}, 0x10) write(r3, &(0x7f0000000280)="1c0000001a009b8a14e5f4070009042400000000ff03000000000000", 0x1e5) ioctl$sock_SIOCGIFBR(r3, 0x8940, &(0x7f00000000c0)=@add_del={0x2, &(0x7f0000000040)='batadv_slave_1\x00'}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$FUSE_DIRENTPLUS(r5, &(0x7f0000000080)=ANY=[@ANYBLOB='='], 0x1) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 15:54:47 executing program 3: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000280)=[{&(0x7f00000003c0)="97596edd19bd683f840e3907305c2763de6234d64db0b7fd9e0a1d48a9722cd48e67fb6fa488dc946b70694b767116b2ca88db8db8edf542f22037e9a3250688b02234bcb8210dc406a9dd37024398937c8bf4eeafcb53d36a2199421a0e40051b0dff1a9d968a84a2b1dd794059c866047c0caedfa278de57616569b175e97dfc7f06f037f19d142624c9dfe83d680ca6805c761f4a0ca9590cd3b4b7adfaeead5ff44dab6cc158ffcef9ed34bf2fcf9b6096ab31b788b43c467c396986ac216510403e917eae19103e4aae8be3630be03fd76f593064ec8973cd7b74", 0xdd}, {&(0x7f00000004c0)="910d46e205f5a1c1f859adea29efacffe659152c0ee89ff65401bd36539dcbe916616fdca73cd4ae5c86554968bd733a5ab5c426ec3bf7e39b8312b8c8a6def95e", 0x41}, {&(0x7f0000000780)="1cf26c73f1fa8df22e6b13621963042471fb3a6c70deefee7b490d7ec574e981b77d4a0f9f28d1e857eeb1ca94ca271c5ec9dba1b664e037d87d8761e75e7fa49ded2db9a519607bd57d543560", 0x4d}, {&(0x7f00000005c0)="a2d1aca730cc52074f69e3b111851a94cbe34e1b5883f9ce8e5311f0e4614987f60596fb5acbf0f0f22e7f19096f3883f7ab11a64d541fb18d116cbe17c7cacec821a8e774d4d82413c7fa2ffe2b36265e0db5d109391de4d8cef9e513e2cb4b5168140d1a53543a99403b8378807bc352edd6246e576b0942b69754958c2dcb5b8c1fc912d84e879e7ff1abb48bcadf4acc97c87150a2e3da89c3d8fcdc4e8437c0572b3067cc6962637baddb2d794330c981c386b6835c7bb6d05813b37d613b24f8a03944f46932c476a5e2dc6e4b2111cfeb9a03db290b7a96581442b965ea3a2db02f0a560b1578065180e0e203", 0xf0}], 0x4, 0xe) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x2000, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000100)={0x0, 0x5, 0x0, 0xffffffffffff7fbe}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$USBDEVFS_REAPURB(r3, 0x4008550c, &(0x7f0000000340)) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r2, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={0x0}}, 0x4048081) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000003240)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r2, &(0x7f0000000580)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000c40)=ANY=[@ANYBLOB="02000000", @ANYRES16, @ANYBLOB="00022cbd7000fbdbdf251b00000000009a000000000000009200070000f2ffff990000000000000000060000cc000b3a4758222ec326efb21854f165518c6e7bc059ef3b22dcd0fe48462f3e662caa88c3e21bbf9a35d890cfef0546c5b365b6cdd27409c4e4ca97e928713782adbad041835bfbb4bd06787fa27325d07300ac107a712cf95de8ae12553def981ed9aff08316d96d7385739b35dee769ad77dab70d2a41f2e39d525eb53c77cfc0ab80fc83df8ff10e77534361a42aea441c471f5c1039005d4988051ed0e1cad82a5195bb8b4cfd4fae0e3436fe85ec96cb788f99c73311b52288a24b42a720c8f9b14ebcd06628c8d237f4632ec56c8477f75414fe31803767d1f4e91edcc185ad11883b2670c4f924f6f19145bd4761d1f2f7d87510f85d282042f9dde531e0e8bd1f78ce073b7d07a90f40612fc182"], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x810) r5 = socket(0x100000000011, 0x2, 0x0) bind(r5, &(0x7f0000000200)=@generic={0x11, "0000010000000000080003ba000100012e0b3836005404b0e0301a4cf875f2e3ff5f163ee340b76795008000000000007f000000000000009e15775027ecce66fd792bbf0e5bf5ff1b080000000009000000000000000025ad8e5ecc326d3a0906c3c65400"}, 0x80) getsockname$packet(r5, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000800)=ANY=[@ANYBLOB="240000002e000709f8ffffffffffffff010000000d46ca048c91b0da1a05b356318dded06e6967d797a6de5dc0fac23fab1141eb45a411e6e46ba4f2845f0283b16aa5d45bb0d62bc76c3f45205e330e52e071dbfded753549489ec87133051cc1979a39bb9ad73aa93612c9ff91a9adf550666951a4200358fdccf18b9b58f32f539d5664573bdbd07c96a7a996eed908631216a7059f1f506c00ff0cfd55dcb0ad616a982c0aeee01daf2bb5476f00c6143f6459fc031cfff2362a340cdd200347499a254b04a5922ff4ae7bce6769c5b2edb0", @ANYRES32=r6], 0x2}}, 0x0) sendmsg$NL80211_CMD_GET_INTERFACE(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r4, 0x100, 0x70bd2a, 0x25dfdbfe, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r6}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x7}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}]}, 0x30}}, 0x8004) r7 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r7, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r7, &(0x7f00000092c0), 0x4ff, 0xeffdffff0000ff00) 15:54:47 executing program 1: futex(0x0, 0xc, 0x1, &(0x7f0000000a00), 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) creat(0x0, 0x0) socket(0x0, 0x0, 0x0) io_setup(0x100000000000c333, &(0x7f0000000200)=0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x12e) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r3, &(0x7f00000000c0), 0x235) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000000), 0x4) write$UHID_INPUT2(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0xf0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x30012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x1867f, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0xff0f, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 15:54:47 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x420000015001}) r1 = dup(r0) r2 = socket$packet(0x11, 0x2, 0x300) accept$packet(r2, 0x0, &(0x7f0000000000)) setsockopt$TIPC_MCAST_BROADCAST(r1, 0x10f, 0x85) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TUNSETLINK(r0, 0x400454cd, 0x6) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) 15:54:47 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) socket$key(0xf, 0x3, 0x2) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x7f) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="0400000000000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@tz_utc='tz=UTC'}]}) [ 100.567120][ T138] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 100.577249][ T138] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on sz1 [ 100.594608][ T113] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 100.604493][ T113] hid-generic 0000:0000:0000.0002: hidraw1: HID v0.00 Device [syz1] on sz1 [ 101.366816][ T4616] kasan: CONFIG_KASAN_INLINE enabled [ 101.372136][ T4616] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 101.380256][ T4616] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 101.387186][ T4616] CPU: 1 PID: 4616 Comm: syz-executor.1 Not tainted 5.4.27-syzkaller-00638-g8874c961255a #0 [ 101.397232][ T4616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 101.407297][ T4616] RIP: 0010:__wake_up_common+0x218/0x450 [ 101.412921][ T4616] Code: 89 c5 c7 45 c0 00 00 00 00 eb 10 0f 1f 80 00 00 00 00 4d 39 e5 0f 84 e1 01 00 00 4c 89 e3 4d 8d 74 24 e8 4c 89 e0 48 c1 e8 03 <80> 3c 10 00 74 12 48 89 df e8 fa 9f 47 00 48 ba 00 00 00 00 00 fc [ 101.432609][ T4616] RSP: 0018:ffff8881c8997c18 EFLAGS: 00010046 [ 101.438671][ T4616] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 101.446642][ T4616] RDX: dffffc0000000000 RSI: 0000000000000001 RDI: ffff8881d3eb12a0 [ 101.454614][ T4616] RBP: ffff8881c8997c70 R08: 0000000000000000 R09: ffff8881c8997cc0 [ 101.462580][ T4616] R10: ffffed1039132f7d R11: 0000000000000004 R12: 0000000000000000 [ 101.470537][ T4616] R13: ffff8881d3eb12a8 R14: ffffffffffffffe8 R15: ffff8881c8997cc0 [ 101.478683][ T4616] FS: 0000000001fbd940(0000) GS:ffff8881dbb00000(0000) knlGS:0000000000000000 [ 101.487599][ T4616] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 101.494168][ T4616] CR2: 00007f6c961cb008 CR3: 00000001d579d005 CR4: 00000000001606e0 [ 101.502130][ T4616] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 101.510089][ T4616] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 101.518045][ T4616] Call Trace: [ 101.521328][ T4616] __wake_up+0x145/0x210 [ 101.525559][ T4616] ? remove_wait_queue+0x130/0x130 [ 101.530657][ T4616] ? __fsnotify_parent+0x300/0x300 [ 101.535764][ T4616] uhid_char_release+0x98/0x600 [ 101.540601][ T4616] ? uhid_char_open+0x220/0x220 [ 101.545438][ T4616] __fput+0x295/0x710 [ 101.549411][ T4616] ____fput+0x15/0x20 [ 101.553383][ T4616] task_work_run+0x176/0x1a0 [ 101.557961][ T4616] prepare_exit_to_usermode+0x2d8/0x370 [ 101.563497][ T4616] syscall_return_slowpath+0x6f/0x500 [ 101.568855][ T4616] do_syscall_64+0xe8/0x100 [ 101.573346][ T4616] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 101.579227][ T4616] RIP: 0033:0x4163e1 [ 101.583108][ T4616] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 101.602703][ T4616] RSP: 002b:00007fff4ee17a50 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 101.611189][ T4616] RAX: 0000000000000000 RBX: 0000000000000006 RCX: 00000000004163e1 [ 101.619153][ T4616] RDX: 0000000000000000 RSI: 00000000000003aa RDI: 0000000000000005 [ 101.627112][ T4616] RBP: 0000000000000001 R08: 00000000de9103ae R09: 00ffffffffffffff [ 101.635076][ T4616] R10: 00007fff4ee17b30 R11: 0000000000000293 R12: 000000000076c900 [ 101.645959][ T4616] R13: 000000000076c900 R14: 0000000000018966 R15: 000000000076bfac [ 101.653916][ T4616] Modules linked in: [ 101.657798][ T4616] ---[ end trace 194c2babb9cae3f8 ]--- [ 101.663247][ T4616] RIP: 0010:__wake_up_common+0x218/0x450 [ 101.668863][ T4616] Code: 89 c5 c7 45 c0 00 00 00 00 eb 10 0f 1f 80 00 00 00 00 4d 39 e5 0f 84 e1 01 00 00 4c 89 e3 4d 8d 74 24 e8 4c 89 e0 48 c1 e8 03 <80> 3c 10 00 74 12 48 89 df e8 fa 9f 47 00 48 ba 00 00 00 00 00 fc [ 101.688450][ T4616] RSP: 0018:ffff8881c8997c18 EFLAGS: 00010046 [ 101.694500][ T4616] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 101.702455][ T4616] RDX: dffffc0000000000 RSI: 0000000000000001 RDI: ffff8881d3eb12a0 [ 101.710412][ T4616] RBP: ffff8881c8997c70 R08: 0000000000000000 R09: ffff8881c8997cc0 [ 101.718376][ T4616] R10: ffffed1039132f7d R11: 0000000000000004 R12: 0000000000000000 [ 101.726331][ T4616] R13: ffff8881d3eb12a8 R14: ffffffffffffffe8 R15: ffff8881c8997cc0 [ 101.734290][ T4616] FS: 0000000001fbd940(0000) GS:ffff8881dbb00000(0000) knlGS:0000000000000000 [ 101.743203][ T4616] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 101.749772][ T4616] CR2: 00007f6c961cb008 CR3: 00000001d579d005 CR4: 00000000001606e0 [ 101.757734][ T4616] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 101.765694][ T4616] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 101.773656][ T4616] Kernel panic - not syncing: Fatal exception [ 101.780312][ T4616] Kernel Offset: disabled [ 101.784631][ T4616] Rebooting in 86400 seconds..